Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v683-vqvc-9wvq

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a heap-based buffer overflow vulnerability in the submitForm function, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file in Acrobat Reader.

Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a heap-based buffer overflow vulnerability in the submitForm function, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file in Acrobat Reader.

EPSS

Процентиль: 96%
0.21322
Средний

Дефекты

CWE-122

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a heap-based buffer overflow vulnerability in the submitForm function, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file in Acrobat Reader.

CVSS3: 8.8
fstec
больше 5 лет назад

Уязвимость программ просмотра PDF-файлов Adobe Reader Document Cloud, Adobe Reader и программ редактирования PDF-файлов Adobe Acrobat Document Cloud, Adobe Acrobat, вызванная переполнением буфера в «куче», позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 96%
0.21322
Средний

Дефекты

CWE-122